Palo Alto Networks has warned its users about 34 vulnerabilities in their products and released four security advisories. They haven’t found any attacks yet, but it’s important for users to update their systems quickly.
Certain Palo Alto products, specifically PAN-OS and GlobalProtect App, are affected by vulnerabilities. Some of these security gaps stem from third-party software, underscoring the interconnected nature of today’s digital ecosystem.
By infosecbulletin
/ Sunday , December 8 2024
Google has announced Vanir, an open-source tool for detecting and fixing security vulnerabilities, publicly available for developers. Vanir is a...
Read More
By infosecbulletin
/ Saturday , December 7 2024
The spokesperson from Deloitte told two international media that, “No Deloitte systems have been impacted,”. The allegations relate to a...
Read More
By infosecbulletin
/ Saturday , December 7 2024
A newly found zero-day vulnerability lets attackers steal NTLM credentials by manipulating targets into opening a malicious file in Windows...
Read More
By infosecbulletin
/ Saturday , December 7 2024
Every day a lot of cyberattack happen around the world including ransomware, Malware attack, data breaches, website defacement and so...
Read More
By infosecbulletin
/ Friday , December 6 2024
A bootloader vulnerability in Cisco NX-OS affects over 100 switches, enabling attackers to bypass image signature checks. Cisco issued security...
Read More
By infosecbulletin
/ Friday , December 6 2024
On December 5, 2024, CISA issued two advisories regarding Industrial Control Systems (ICS). These advisories highlight current security issues, vulnerabilities,...
Read More
By infosecbulletin
/ Thursday , December 5 2024
DroidBot is a sophisticated Android Remote Access Trojan (RAT) that merges traditional hidden VNC and overlay functions with spyware-like features....
Read More
By infosecbulletin
/ Thursday , December 5 2024
Brain Cipher, a ransomware group that emerged in June 2024, claims to have stolen 1TB of data from Deloitte UK,...
Read More
By infosecbulletin
/ Thursday , December 5 2024
AI and GPU operations are crucial for modern data centers, but they generate significant energy consumption and heat. A new...
Read More
By infosecbulletin
/ Thursday , December 5 2024
Every day a lot of cyberattack happen around the world including ransomware, Malware attack, data breaches, website defacement and so...
Read More
Prisma Access Browser Update:
The Prisma Access Browser, based on Chromium, has been updated to version 127.100.2858.4. This update includes fixes for 31 vulnerabilities from four “Chromium” updates between July 16 and August 6.
Of particular concern are CVE-2024-7532 and CVE-2024-6990, labeled as “Critical” by Google. Though Palo Alto assigns these a slightly lower CVSSv4.0 base score of 8.6, they still carry a “High” severity rating, emphasizing the need for swift action.
Cortex XSOAR Patch:
Cortex XSOAR version 1.12.33 fixed a command injection vulnerability (CVE-2024-5914) in the CommonScripts Pack. This flaw has a CVSS score of 7.0 and could allow an attacker to execute arbitrary commands without authentication, potentially compromising the system.
Additional Vulnerabilities Addressed:
The advisories also tackled:
CVE-2024-5916 (CVSS 6):
A fixed vulnerability in PAN-OS and Cloud NGFW versions that unintentionally exposed sensitive data
CVE-2024-5915 (CVSS 5.2):
The GlobalProtect app on Windows has a vulnerability that allows local users to run programs with higher privileges. The issue will be fixed in future app updates.
Call to Action:
Palo Alto Networks advises users to update their systems with the latest patches to protect against potential cyber threats. It’s important to stay proactive in cybersecurity to ensure strong defense.